Cybercriminals Leak Millions of Records in “Free Leakmas” Campaign During the Holiday Season

The holiday season is usually a time of joy and celebration, but for cybercriminals, it presented an opportunity to carry out their nefarious activities. In the days leading up to Christmas, a staggering 50 million records containing sensitive personal information were leaked by these threat actors. These leaks, primarily found on the Dark Web, were labeled “Free Leaksmas,” indicating that the criminals were sharing their data as a gesture of mutual gratitude among their ilk.

“Free Leaksmas” campaign on the Dark Web

The Dark Web served as the platform for cybercriminals to exchange and share compromised data during the holiday season. The “Free Leaksmas” campaign demonstrated a peculiar form of camaraderie among these threat actors. It is believed that by sharing their stolen data, they were expressing gratitude towards one another and establishing an environment of trust within their criminal network. As part of the campaign, underground shops offering compromised accounts on online banking and ecommerce platforms even provided substantial discounts, with markdowns reaching up to 40%.

Data dumps from various breaches

Several major data breaches contributed to the “Free Leaksmas” campaign, resulting in significant record leaks. One of the most prominent dumps came from a breach at Peruvian telecom provider Movistar, where a staggering 22 million records containing customer phone numbers and identification numbers were compromised. This breach is concerning as it exposes a vast amount of personal information that could potentially be exploited for various malicious purposes.

In addition to the Movistar breach, other notable Leaksmas datasets emerged from breaches at a Vietnamese fashion retailer and a French company. Both of these breaches yielded millions of records, further fueling concerns about the extent of personal data available to cybercriminals.

Revisiting older incidents

Interestingly, some of the leaked data appeared to originate from older incidents that had resurfaced. One such incident was the rumored breach of the Swedish fintech company Klarna in 2022. It is clear that cybercriminals are not only focused on recent breaches but also revisiting past incidents to exploit any remaining vulnerabilities and retrieve valuable data.

Notable threat actors involved

Several known threat actor groups have been identified as participating in the “Free Leaksmas” campaign. One such group is SeigedSec, a pro-Iranian entity that has previously targeted critical infrastructure and industrial control systems environments in Israel. Their involvement in sharing compromised data during the holiday break raises concerns over potential future attacks on critical systems.

Another group involved in the Leaksmas campaign is the hacktivist alliance known as the “Five Families.” This group claimed responsibility for stealing records from a large Chinese clothing store due to its alleged abusive labor practices and government connections. The motivations behind their actions highlight the intersection between cybercrime and activism.

Discounts and Focus on Stolen Credit Card Data

As digital identity remains a primary focus for cybercriminals, those selling stolen credit card data and related services offer attractive discounts to entice new buyers. Cybercriminals recognize the lucrative nature of stolen credit card information and the potential for financial gain. By offering discounts, they seek to expand their customer base and increase the demand for stolen data.

The “Free Leaksmas” campaign conducted by cybercriminals during the holiday season resulted in a massive influx of leaked personal data. The collaboration and data sharing observed among these threat actors signifies the existence of a robust criminal network. With notable threat actors and the abundance of compromised accounts and credit card information, the importance of data security cannot be stressed enough. As we move forward, it is crucial for individuals and organizations to remain vigilant and implement robust cybersecurity measures to protect against such breaches and safeguard sensitive information.

Explore more

How Is the New Wormable XMRig Malware Evolving?

The rapid transformation of cryptojacking from a minor background annoyance into a sophisticated, kernel-level security threat has forced global cybersecurity professionals to fundamentally rethink their entire defensive posture as the landscape continues to shift through 2026. While earlier versions of Monero-mining software were often content to quietly steal idle CPU cycles, the emergence of a new, wormable XMRig variant signals

AI-Driven Behavioral Intelligence – Review

The rapid proliferation of machine-learning-assisted malware has officially transformed the cybersecurity landscape into a high-stakes competition where static defense is no longer a viable strategy for survival. While traditional security measures once relied on a digital library of known threats to protect networks, the current environment demands a system capable of interpreting the intent behind a process rather than just

Trend Analysis: India AI Sovereignty and Evaluation Standards

While the global race to build the largest large language model often dominates technology headlines, a more subtle and arguably more consequential shift is occurring within the Indian subcontinent’s technological landscape. This transition marks a departure from the simple pursuit of “national champion” models toward a more sophisticated objective: the establishment of sovereign evaluation standards. As artificial intelligence becomes deeply

AI and Stolen Credentials Redefine Modern Enterprise Risk

The traditional castle-and-moat defense strategy has become an obsolete relic in an era where digital identities are the primary gateway for highly sophisticated global threat actors. Recent data suggests that enterprise risk has fundamentally transitioned from frequent but localized incidents toward high-impact disruptions that threaten the very fabric of systemic stability. This shift is punctuated by the emergence of identity

How Is AI Accelerating the Speed of Modern Cyberattacks?

Dominic Jainy brings a wealth of knowledge in artificial intelligence and blockchain to the table, offering a unique perspective on the modern threat landscape. As cybercriminals harness machine learning to automate exploitation, the gap between a vulnerability being discovered and a breach occurring is shrinking at an alarming rate. We sit down with him to discuss the shift toward identity-based